ClopÀÕË÷Èí¼þ×éÖ¯¹¥»÷¹þ·ð´óѧ²¢Íþвй¶Êý¾Ý
Ðû²¼Ê±¼ä 2025-10-141. ClopÀÕË÷Èí¼þ×éÖ¯¹¥»÷¹þ·ð´óѧ²¢Íþвй¶Êý¾Ý
10ÔÂ12ÈÕ£¬£¬£¬£¬£¬ClopÀÕË÷Èí¼þ×éÖ¯ÔÚÆäTorÊý¾ÝÐ¹Â¶ÍøÕ¾Îª¹þ·ð´óѧ½¨ÉèרÊôÒ³Ãæ£¬£¬£¬£¬£¬Ðû³Æ½«Ð¹Â¶ÇÔÈ¡µÄÊý¾Ý£¬£¬£¬£¬£¬²¢Éù³Æ¡°Êý¾Ý´æµµ¾ÙÐÐÖУ¬£¬£¬£¬£¬ÖÖ×ÓÁ´½Ó¼´½«ÍƳö¡±£¬£¬£¬£¬£¬Í¬Ê±Ö¸Ôð¹þ·ðºöÊÓ¿Í»§Çå¾²¡£¡£¡£¡£¡£¡£¸Ã×éÖ¯×÷Ϊ¶íÓïÀÕË÷Èí¼þ¼´Ð§ÀÍ£¨RaaS£©µÄ´ú±í£¬£¬£¬£¬£¬×Ô2019Äê2ÔÂÊ״ηºÆðÒÔÀ´£¬£¬£¬£¬£¬ÒÀ¸½ÆäÔ´×ÔTA505·¸·¨¼¯ÍÅ£¨»îÔ¾×Ô2014Ä꣩µÄÅä¾°£¬£¬£¬£¬£¬×¨×¢ÓÚ¡°´óÐÍÁÔÎ¹¥»÷ÓëË«ÖØÀÕË÷Õ½ÂÔ£¬£¬£¬£¬£¬³ÉΪȫÇòÍøÂçÇå¾²ÖØ´óÍþв¡£¡£¡£¡£¡£¡£ClopµÄÔË×÷ģʽ¼«¾ßϵͳÐÔ£ºÏÈͨ¹ýÁãÈÕÎó²î»òÒ×Êܹ¥»÷µÄµÚÈý·½Èí¼þ£¨ÈçMOVEit¡¢GoAnywhere¡¢Oracle EBS£©ÇÖÈëÄ¿µÄÍøÂ磬£¬£¬£¬£¬ÇÔÈ¡Ãô¸ÐÊý¾Ý²¢¼ÓÃÜϵͳ£»£»£»£»Ëæºó½«Êý¾ÝÐû²¼ÖÁ°µÍøÐ¹Â¶ÍøÕ¾£¬£¬£¬£¬£¬ÆÛѹÊܺ¦ÕßÖ§¸¶Êê½ð¡£¡£¡£¡£¡£¡£ÆäÊÖÒÕÊֶΰüÀ¨Ê¹Óóõʼ»á¼ûÊðÀí¡¢×Ô¶¯»¯¹¤¾ß¼°ÖØ´óºáÏòÒÆÏÂÊÖÒÕÀ©´ó¹¥»÷¹æÄ££¬£¬£¬£¬£¬Í¬Ê±¹æ±Ü¶íÓïϵͳÒÔ×èÖ¹±¾ÍÁÖ´·¨¹¥»÷¡£¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬¸Ã×éÖ¯ºã¾Ã±Ü¿ªÇ°ËÕÁª¹ú¼ÒÄ¿µÄ£¬£¬£¬£¬£¬ÇÒÆä¶ñÒâÈí¼þÔÚ¶íÓïÅÌËã»úÉÏÎÞ·¨¼¤»î¡£¡£¡£¡£¡£¡£
https://securityaffairs.com/183282/cyber-crime/clop-ransomware-group-claims-the-hack-of-harvard-university.html
2. ´ó¹æÄ£¿£¿£¿£¿ç¹ú½©Ê¬ÍøÂçÃé×¼ÃÀ¹úRDPЧÀÍ
10ÔÂ13ÈÕ£¬£¬£¬£¬£¬¿ËÈÕ£¬£¬£¬£¬£¬Ò»¸öÓÉÁè¼Ý10ÍòIPµØµã×é³ÉµÄ¿ç¶à¹ú½©Ê¬ÍøÂçÕý¶ÔÃÀ¹úÔ¶³Ì×ÀÃæÐÒ飨RDP£©Ð§ÀÍÌᳫ´ó¹æÄ£¹¥»÷¡£¡£¡£¡£¡£¡£¸Ã»î¶¯×Ô10ÔÂ8ÈÕÆô¶¯£¬£¬£¬£¬£¬Ñо¿Ö°Ô±Í¨¹ýIPȪԴÆÊÎöÈ·ÈϹ¥»÷Ô´×Ô¶à¹ú½©Ê¬ÍøÂ缯Ⱥ¡£¡£¡£¡£¡£¡£RDP×÷ΪWindowsϵͳԶ³ÌÅþÁ¬µÄ½¹µãÐÒ飬£¬£¬£¬£¬³£±»ÖÎÀíÔ±¡¢Ð§ÀĮ́¼°Ô¶³ÌÊÂÇéÕßʹÓ㬣¬£¬£¬£¬µ«¿ª·Å¶Ë¿ÚÒ׳ÉΪ¹¥»÷Ä¿µÄ¡£¡£¡£¡£¡£¡£¹¥»÷Õßͨ³£Í¨¹ýɨÃ迪·Å¶Ë¿Ú¡¢Ç¿ÖƵǼ¡¢Ê¹ÓÃÎó²î»òÖ´ÐÐ׼ʱ¹¥»÷ʵÑéÈëÇÖ¡£¡£¡£¡£¡£¡£±¾´Î¹¥»÷ÖУ¬£¬£¬£¬£¬Íþв¼à¿ØÆ½Ì¨GreyNoise·¢Ã÷½©Ê¬ÍøÂçÖ÷Òª½ÓÄÉÁ½ÖÖRDPÏà¹Ø¹¥»÷ÊֶΣºÆäһΪ¡°RD Web»á¼û¼ÆÊ±¹¥»÷¡±£¬£¬£¬£¬£¬Í¨¹ý̽²âRD Web¶Ëµã²¢ÕÉÁ¿ÄäÃûÈÏÖ¤Á÷³ÌµÄÏìӦʱ¼ä²î±ð£¬£¬£¬£¬£¬ÍƶÏÓÐÓÃÓû§Ãû£»£»£»£»Æä¶þΪ¡°RDP Web¿Í»§¶ËµÇ¼ö¾Ù¡±£¬£¬£¬£¬£¬Í¨¹ýÊÓ²ìЧÀÍÆ÷ÐÐΪ¼°ÏìÓ¦²î±ðö¾ÙÓû§ÕË»§¡£¡£¡£¡£¡£¡£»£»£»£»î¶¯×î³õÔÚ°ÍÎ÷·ºÆðÒì³£Á÷Á¿¼¤Ôö£¬£¬£¬£¬£¬ËæºóѸËÙÀ©É¢ÖÁ°¢¸ùÍ¢¡¢ÒÁÀÊ¡¢Öйú¡¢Ä«Î÷¸ç¡¢¶íÂÞ˹¡¢ÄÏ·Ç¡¢¶ò¹Ï¶à¶ûµÈÈ«Çò¶à¹ú£¬£¬£¬£¬£¬Éæ¼°×°±¸ÊÜËð¹ú¼ÒÒѳ¬100¸ö¡£¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬ÏÕЩËùÓй¥»÷IPµØµã¾ù¹²ÏíͨÓÃTCPÖ¸ÎÆ£¬£¬£¬£¬£¬Ö»¹Ü×î´ó¶Î´óС£¡£¡£¡£¡£¡£¨MSS£©±£´æ²î±ð£¬£¬£¬£¬£¬µ«Ñо¿Ö°Ô±ÒÔΪÕâÔ´ÓÚ½©Ê¬ÍøÂ缯ȺµÄ×é³ÉÌØÕ÷¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/massive-multi-country-botnet-targets-rdp-services-in-the-us/
3. ÃÀ¹úҽѧ³ÉÏñ¾ÞÍ·SimonMedÔâMedusaÀÕË÷Èí¼þ¹¥»÷
10ÔÂ13ÈÕ£¬£¬£¬£¬£¬ÃÀ¹úҽѧ³ÉÏñÌṩÉÌSimonMed Imaging¿ËÈÕÏò³¬120ÍòÃûСÎÒ˽¼Ò·¢³öÊý¾Ýй¶֪ͨ£¬£¬£¬£¬£¬Õ¹ÏÖÆäÔâÓöµÄÑÏÖØÍøÂçÇå¾²ÊÂÎñ¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾×÷ΪÃÀ¹ú11¸öÖÝÔ¼170¼ÒÒ½ÁÆÖÐÐĵÄÔËÓª·½£¬£¬£¬£¬£¬ÄêÊÕÈ볬5ÒÚÃÀÔª£¬£¬£¬£¬£¬ÌṩMRI¡¢CT¡¢XÉäÏßµÈȫϵÁÐҽѧӰÏñЧÀÍ¡£¡£¡£¡£¡£¡£ÊÂÎñʼÓÚ2025Äê1ÔÂ21ÈÕÖÁ2ÔÂ5ÈÕʱ´ú£¬£¬£¬£¬£¬ºÚ¿ÍÈëÇÖSimonMedϵͳ²¢»á¼û¹«Ë¾ÍøÂç¡£¡£¡£¡£¡£¡£1ÔÂ27ÈÕ£¬£¬£¬£¬£¬Æä¹©Ó¦ÉÌÊ×Ïȱ¨¸æÇå¾²ÊÂÎñ£¬£¬£¬£¬£¬Ô½ÈÕSimonMedÈ·ÈÏÍøÂç±£´æ¿ÉÒɻ¡£¡£¡£¡£¡£¡£¹«Ë¾Ëæ¼´Æô¶¯Ó¦¼±ÏìÓ¦£¬£¬£¬£¬£¬°üÀ¨ÖØÖÃÃÜÂë¡¢°²ÅŶàÒòËØÈÏÖ¤£¨MFA£©¡¢Ìí¼Ó¶Ëµã¼ì²âÓëÏìÓ¦£¨EDR£©¼à¿Ø¡¢ÏÞÖÆµÚÈý·½»á¼ûȨÏÞ£¬£¬£¬£¬£¬²¢ÏÞÖÆÍøÂçÁ÷Á¿ÖÁ¿ÉÐÅÅþÁ¬¡£¡£¡£¡£¡£¡£Í¬Ê±£¬£¬£¬£¬£¬¹«Ë¾ÏòÖ´·¨²¿·Ö¼°Êý¾ÝÇ徲ר¼Òת´ïÇéÐΡ£¡£¡£¡£¡£¡£¾ÝMedusaÀÕË÷Èí¼þÉùÃ÷£¬£¬£¬£¬£¬ÆäÇÔÈ¡ÁË212GBÊý¾Ý£¬£¬£¬£¬£¬°üÀ¨Éí·Ý֤ɨÃè¼þ¡¢»¼ÕßÏêϸÐÅÏ¢¡¢¸¶¿î¼Í¼¡¢ÕË»§Óà¶î¡¢Ò½ÁƱ¨¸æ¼°ÔʼɨÃè¼þµÈÃô¸ÐÄÚÈÝ¡£¡£¡£¡£¡£¡£¸ÃÍÅ»ïÒªÇóÖ§¸¶100ÍòÃÀÔªÊê½ð¼°ÖðÈÕ1ÍòÃÀÔªÑÓÆÚ·Ñ£¬£¬£¬£¬£¬²»È»½«¹ûÕæËùÓÐÊý¾Ý¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/simonmed-says-12-million-patients-impacted-in-january-data-breach/
4. Unity Technologies SpeedTreeÍøÕ¾Ôâ¶ñÒâ´úÂë¹¥»÷
10ÔÂ13ÈÕ£¬£¬£¬£¬£¬ÊÓÆµÓÎÏ·Èí¼þ¿ª·¢¹«Ë¾Unity TechnologiesÅû¶ÆäSpeedTreeÍøÕ¾½áÕËÒ³Ãæ±£´æ¶ñÒâ´úÂ룬£¬£¬£¬£¬µ¼ÖÂÊý°ÙÃû¿Í»§Ãô¸ÐÐÅϢй¶¡£¡£¡£¡£¡£¡£¾ÊӲ죬£¬£¬£¬£¬¸Ã¶ñÒâ´úÂë×Ô2025Äê3ÔÂ13ÈÕÆð±ã±»Ö²ÈëÍøÕ¾£¬£¬£¬£¬£¬Ö±ÖÁ8ÔÂ26ÈÕ±»·¢Ã÷ºóÁ¬Ã¦É¾³ý£¬£¬£¬£¬£¬Ê±´úÒ»Á¬ÇÔÈ¡Óû§ÔÚ¹ºÖÃÀú³ÌÖÐÊäÈëµÄÃô¸ÐÊý¾Ý¡£¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñÓ°Ïì¹æÄ£Ã÷È·£¬£¬£¬£¬£¬Éæ¼°2025Äê3ÔÂ13ÈÕÖÁ8ÔÂ26ÈÕʱ´úͨ¹ýSpeedTreeÍøÕ¾¹ºÎïµÄ428Ãû¿Í»§¡£¡£¡£¡£¡£¡£Ð¹Â¶ÐÅÏ¢°üÀ¨¿Í»§ÐÕÃû¡¢µØµã¡¢µç×ÓÓʼþ¡¢ÐÅÓÿ¨ºÅ¼°»á¼û´úÂëµÈ¸ß¶ÈÃô¸ÐÊý¾Ý¡£¡£¡£¡£¡£¡£Æ¾Ö¤Unity TechnologiesÏòÃåÒòÖÝ×ÜÉó²é³¤Ìá½»µÄÊý¾Ýй¶֪ͨ£¬£¬£¬£¬£¬¸Ã¶ñÒâ´úÂëδ¾ÊÚȨ£¬£¬£¬£¬£¬¿ÉÄÜÔÊÐí¹¥»÷Õß»ñÈ¡Óû§ÔÚ½áÕËÒ³ÃæÊäÈëµÄÉÏÊöÐÅÏ¢¡£¡£¡£¡£¡£¡£ÎªÓ¦¶Ô´Ë´ÎÇå¾²ÊÂÎñ£¬£¬£¬£¬£¬Unity TechnologiesѸËÙ½ÓÄɶàÏî²½·¥£º¹Ø±ÕÊÜѬȾµÄSpeedTreeÍøÕ¾ÒÔ×è¶Ï¹¥»÷·¾¶£¬£¬£¬£¬£¬ÖÜÈ«Éó²éÊÜÓ°ÏìÎļþÒÔÆÀ¹ÀËðʧ¹æÄ££¬£¬£¬£¬£¬²¢×Ô¶¯Í¨ÖªÊÜÓ°Ïì¿Í»§¼°î¿Ïµ²¿·Ö¡£¡£¡£¡£¡£¡£Í¬Ê±£¬£¬£¬£¬£¬¹«Ë¾ÔöÇ¿ÁËÍøÂçÇå¾²·À»¤²½·¥£¬£¬£¬£¬£¬ÒÔ±ÜÃâÀàËÆÊÂÎñÔٴα¬·¢¡£¡£¡£¡£¡£¡£×÷Ϊµ÷½â²½·¥£¬£¬£¬£¬£¬Unity Technologiesͨ¹ýEquifaxΪÊÜÓ°ÏìСÎÒ˽¼ÒÌṩΪÆÚ12¸öÔµÄÃâ·ÑÐÅÓÃ¼à¿ØºÍÉí·Ý±£»£»£»£»¤Ð§ÀÍ£¬£¬£¬£¬£¬ÒÔ½µµÍÉí·Ý͵ÇÔºÍÚ²ÆÎ£º¦¡£¡£¡£¡£¡£¡£
https://securityaffairs.com/183349/data-breach/customer-payment-data-stolen-in-unity-technologiess-speedtree-website-compromise.html
5. SonicWall SSLVPNÕË»§Ôâ´ó¹æÄ£Æ¾Ö¤ÇÔÈ¡¹¥»÷
10ÔÂ13ÈÕ£¬£¬£¬£¬£¬Ñо¿Ö°Ô±¿ËÈÕÖÒÑÔ£¬£¬£¬£¬£¬ÍþвÐÐΪÕßͨ¹ýÇÔÈ¡µÄÓÐÓÃÆ¾Ö¤Ìᳫ´ó¹æÄ£¹¥»÷£¬£¬£¬£¬£¬ÈëÇÖÁËÁè¼Ý100¸öSonicWall SSLVPNÕË»§¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷»î¶¯×Ô10ÔÂ4ÈÕÆðÔÚÍйÜÍøÂçÇ徲ƽ̨Huntress¼à²âµÄ16¸ö¿Í»§ÇéÐÎÖм¯Öб¬·¢£¬£¬£¬£¬£¬ÖÁ10ÔÂ10ÈÕÈÔÒ»Á¬¾ÙÐУ¬£¬£¬£¬£¬Éæ¼°100Óà¸öÕË»§µÄÒì³£»á¼û¡£¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓÃÇÔÈ¡µÄƾ֤¿ìËÙÑéÖ¤¶à¸öÕË»§Éí·Ý£¬£¬£¬£¬£¬ÔÚ²¿·Ö°¸ÀýÖÐ»á½øÒ»²½Ö´ÐÐÍøÂçɨÃ貢ʵÑé»á¼ûÍâµØWindowsÕË»§£¬£¬£¬£¬£¬ÊµÑéºáÏòÉøÍ¸¡£¡£¡£¡£¡£¡£HuntressÑо¿Ö°Ô±Ö¸³ö£¬£¬£¬£¬£¬¹¥»÷µÄËÙÂÊÓë¹æÄ£Åú×¢¹¥»÷ÕßÕÆÎÕµÄÊÇÓÐÓÃÆ¾Ö¤¶ø·Çͨ¹ý±©Á¦ÆÆ½â»ñÈ¡¡£¡£¡£¡£¡£¡£Ö»¹Ü¹¥»÷Õß¿ÉÄܽâÂëÁËSonicWallÔÆ±¸·ÝÖмÓÃܵķÀ»ðǽÉèÖÃÎļþ£¬£¬£¬£¬£¬µ«ÏÖʵ»ñÈ¡µÄƾ֤ºÍÃÜÔ¿ÈÔÒÔAES-256¼ÓÃÜÐÎʽ±£´æ£¬£¬£¬£¬£¬Ö±½ÓʹÓüÛÖµÊÜÏÞ¡£¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñÓëSonicWall½üÆÚ̻¶µÄÔÆ±¸·ÝÎó²îÎÞÖ±½Ó¹ØÁª£¬£¬£¬£¬£¬¸ÃÎó²îËäµ¼Ö·À»ðǽÉèÖÃÎļþй¶£¬£¬£¬£¬£¬µ«ÆäÖÐÆ¾Ö¤Òѵ¥¶À¼ÓÃÜ¡£¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬¹¥»÷ÈÔ̻¶³öSSLVPNÕË»§µÄÇå¾²Òþ»¼¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/sonicwall-vpn-accounts-breached-using-stolen-creds-in-widespread-attacks/
6. NPM»ù´¡ÉèÊ©ÔâÀÄÓÃÒý·¢´ó¹æÄ£ÍøÂç´¹ÂÚ¹¥»÷
10ÔÂ13ÈÕ£¬£¬£¬£¬£¬ÍøÂçÇå¾²Ñо¿Ö°Ô±¿ËÈÕ½ÒÆÆ£¬£¬£¬£¬£¬ÍþвÐÐΪÕßÕýͨ¹ýÀÄÓÃÕýµ±µÄNPMÈí¼þ°ü»ù´¡ÉèÊ©ÌᳫÐÂÐÍÍøÂç´¹ÂÚ¹¥»÷£¬£¬£¬£¬£¬¸Ã»î¶¯Í»ÆÆ¹Å°å¹©Ó¦Á´¹¥»÷ģʽ£¬£¬£¬£¬£¬ÒѲ¨¼°È«Çò135¸öÄÜÔ´¡¢¹¤Òµ×°±¸¼°ÊÖÒÕÁìÓò×éÖ¯¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷ÒÔ¡°Beamglea¡±»î¶¯Îª½¹µã£¬£¬£¬£¬£¬¶ñÒâÈí¼þ°ü½ÓÄÉ¡°redirect-[a-z0-9]{6}¡±ÃûÌÃÃüÃû£¬£¬£¬£¬£¬Í¨¹ýNPMÐû²¼ºó£¬£¬£¬£¬£¬ÓÉCDNЧÀÍunpkg.comÌṩ¶ñÒâHTMLÎļþ·Ö·¢¡£¡£¡£¡£¡£¡£¹¥»÷Á´ÌõÉè¼ÆÏ¸ÃÜ£ºÍþвÐÐΪÕßÊ×ÏÈÏòÄ¿µÄÊܺ¦Õß·¢ËÍαװ³É²É¹º¶©µ¥¡¢ÊÖÒÕÎĵµµÄHTML¸½¼þ£¬£¬£¬£¬£¬µ±Êܺ¦ÕßÔÚä¯ÀÀÆ÷Öз¿ªÎļþʱ£¬£¬£¬£¬£¬ÄÚǶµÄ¶ñÒâJavaScript´úÂë»á´Óunpkg.com¼ÓÔØ£¬£¬£¬£¬£¬²¢Á¬Ã¦½«Óû§Öض¨ÏòÖÁ´¹ÂÚÒ³Ãæ¡£¡£¡£¡£¡£¡£¸ÃÒ³Ãæ»áÔ¤ÏÈÌîдÊܺ¦ÕßÓÊÏ䵨µã£¬£¬£¬£¬£¬ÓªÔì¡°Õýµ±µÇ¼ÃÅ»§¡±¼ÙÏóÒÔÓÕÆÆ¾Ö¤ÊäÈë¡£¡£¡£¡£¡£¡£Çå¾²¹«Ë¾Socket¼à²âÏÔʾ£¬£¬£¬£¬£¬´ËÀà¶ñÒâÈí¼þ°üÊýÄ¿Òѳ¬175¸ö£¬£¬£¬£¬£¬ÀÛ¼ÆÏÂÔØÁ¿³¬26,000´Î£¬£¬£¬£¬£¬Ö»¹Ü²¿·ÖÏÂÔØÀ´×ÔÇå¾²Ñо¿Ö°Ô±»ò×Ô¶¯»¯É¨Ã蹤¾ß¡£¡£¡£¡£¡£¡£Ä¿µÄ×éÖ¯°üÀ¨ArcelorMittal¡¢ThyssenKrupp Nucera¡¢D-LinkµÈ¿ç¹úÆóÒµ£¬£¬£¬£¬£¬¹¥»÷¹æÄ£¼¯ÖÐÔÚÎ÷Å·¹ú¼Ò£¬£¬£¬£¬£¬Í¬Ê±ÑÓÉìÖÁ±±Å·ºÍÑÇÌ«µØÇø¡£¡£¡£¡£¡£¡£
https://www.securityweek.com/npm-infrastructure-abused-in-phishing-campaign-aimed-at-industrial-and-electronics-firms/


¾©¹«Íø°²±¸11010802024551ºÅ